]> git.proxmox.com Git - mirror_edk2.git/blame - Vlv2TbltDevicePkg/PlatformPkg.fdf
Vlv2TbltDevicePkg: Add PchInitSmm module
[mirror_edk2.git] / Vlv2TbltDevicePkg / PlatformPkg.fdf
CommitLineData
5e752084 1#/** @file\r
2# FDF file of Platform.\r
3#\r
d0274122 4# Copyright (c) 2008 - 2019, Intel Corporation. All rights reserved.<BR>\r
5e752084 5#\r
9dc8036d 6# SPDX-License-Identifier: BSD-2-Clause-Patent\r
5e752084 7#\r
8#\r
9#**/\r
10\r
11[Defines]\r
12DEFINE FLASH_BASE = 0xFFC00000 #The base address of the 4Mb FLASH Device.\r
13DEFINE FLASH_SIZE = 0x00400000 #The flash size in bytes of the 4Mb FLASH Device.\r
14DEFINE FLASH_BLOCK_SIZE = 0x1000 #The block size in bytes of the 4Mb FLASH Device.\r
15DEFINE FLASH_NUM_BLOCKS = 0x400 #The number of blocks in 4Mb FLASH Device.\r
16DEFINE FLASH_AREA_BASE_ADDRESS = 0xFF800000\r
17DEFINE FLASH_AREA_SIZE = 0x00800000\r
18\r
19DEFINE FLASH_REGION_VLVMICROCODE_OFFSET = 0x00000000\r
20DEFINE FLASH_REGION_VLVMICROCODE_SIZE = 0x00040000\r
21DEFINE FLASH_REGION_VLVMICROCODE_BASE = 0xFFC00000\r
22\r
988715a3 23DEFINE FLASH_REGION_VPD_OFFSET = 0x00040000\r
5e752084 24DEFINE FLASH_REGION_VPD_SIZE = 0x0003E000\r
25\r
988715a3 26DEFINE FLASH_REGION_NVSTORAGE_SUBREGION_NV_FTW_WORKING_OFFSET = 0x0007E000\r
5e752084 27DEFINE FLASH_REGION_NVSTORAGE_SUBREGION_NV_FTW_WORKING_SIZE = 0x00002000\r
28\r
29\r
988715a3 30DEFINE FLASH_REGION_NVSTORAGE_SUBREGION_NV_FTW_SPARE_OFFSET = 0x00080000\r
5e752084 31DEFINE FLASH_REGION_NVSTORAGE_SUBREGION_NV_FTW_SPARE_SIZE = 0x00040000\r
32\r
33!if $(MINNOW2_FSP_BUILD) == TRUE\r
988715a3 34DEFINE FLASH_REGION_FSPBIN_OFFSET = 0x000C0000\r
5e752084 35DEFINE FLASH_REGION_FSPBIN_SIZE = 0x00048000\r
988715a3 36DEFINE FLASH_REGION_FSPBIN_BASE = 0xFFCC0000\r
5e752084 37\r
988715a3 38DEFINE FLASH_REGION_AZALIABIN_OFFSET = 0x00108000\r
5e752084 39DEFINE FLASH_REGION_AZALIABIN_SIZE = 0x00008000\r
988715a3 40DEFINE FLASH_REGION_AZALIABIN_BASE = 0xFFD08000\r
5e752084 41\r
42!endif\r
43\r
988715a3 44DEFINE FLASH_REGION_FVMAIN_OFFSET = 0x00110000\r
45DEFINE FLASH_REGION_FVMAIN_SIZE = 0x00210000\r
5e752084 46\r
988715a3 47DEFINE FLASH_REGION_FV_RECOVERY2_OFFSET = 0x00320000\r
48DEFINE FLASH_REGION_FV_RECOVERY2_SIZE = 0x00070000\r
5e752084 49\r
988715a3 50DEFINE FLASH_REGION_FV_RECOVERY_OFFSET = 0x00390000\r
51DEFINE FLASH_REGION_FV_RECOVERY_SIZE = 0x00070000\r
5e752084 52\r
53################################################################################\r
54#\r
55# FD Section\r
56# The [FD] Section is made up of the definition statements and a\r
57# description of what goes into the Flash Device Image. Each FD section\r
58# defines one flash "device" image. A flash device image may be one of\r
59# the following: Removable media bootable image (like a boot floppy\r
60# image,) an Option ROM image (that would be "flashed" into an add-in\r
61# card,) a System "Flash" image (that would be burned into a system's\r
62# flash) or an Update ("Capsule") image that will be used to update and\r
63# existing system flash.\r
64#\r
65################################################################################\r
66[FD.Vlv]\r
67BaseAddress = $(FLASH_BASE)|gPlatformModuleTokenSpaceGuid.PcdFlashAreaBaseAddress #The base address of the 3Mb FLASH Device.\r
68Size = $(FLASH_SIZE)|gPlatformModuleTokenSpaceGuid.PcdFlashAreaSize #The flash size in bytes of the 3Mb FLASH Device.\r
69ErasePolarity = 1\r
70BlockSize = $(FLASH_BLOCK_SIZE) #The block size in bytes of the 3Mb FLASH Device.\r
71NumBlocks = $(FLASH_NUM_BLOCKS) #The number of blocks in 3Mb FLASH Device.\r
72\r
73#\r
74#Flash location override based on actual flash map\r
75#\r
76SET gPlatformModuleTokenSpaceGuid.PcdFlashAreaBaseAddress = $(FLASH_AREA_BASE_ADDRESS)\r
77SET gPlatformModuleTokenSpaceGuid.PcdFlashAreaSize = $(FLASH_AREA_SIZE)\r
78\r
c5a59080
JY
79SET gUefiCpuPkgTokenSpaceGuid.PcdCpuMicrocodePatchAddress = $(FLASH_REGION_VLVMICROCODE_BASE) + 0x60\r
80SET gUefiCpuPkgTokenSpaceGuid.PcdCpuMicrocodePatchRegionSize = $(FLASH_REGION_VLVMICROCODE_SIZE) - 0x60\r
81\r
5e752084 82!if $(MINNOW2_FSP_BUILD) == TRUE\r
83# put below PCD value setting into dsc file\r
84#SET gFspWrapperTokenSpaceGuid.PcdCpuMicrocodePatchAddress = $(FLASH_REGION_VLVMICROCODE_BASE)\r
85#SET gFspWrapperTokenSpaceGuid.PcdCpuMicrocodePatchRegionSize = $(FLASH_REGION_VLVMICROCODE_SIZE)\r
86#SET gFspWrapperTokenSpaceGuid.PcdFlashMicroCodeOffset = 0x60\r
87#SET gFspWrapperTokenSpaceGuid.PcdFlashCodeCacheAddress = $(FLASH_AREA_BASE_ADDRESS)\r
88#SET gFspWrapperTokenSpaceGuid.PcdFlashCodeCacheSize = $(FLASH_AREA_SIZE)\r
89#SET gFspWrapperTokenSpaceGuid.PcdFlashFvFspBase = $(FLASH_REGION_FSPBIN_BASE)\r
90#SET gFspWrapperTokenSpaceGuid.PcdFlashFvFspSize = $(FLASH_REGION_FSPBIN_SIZE)\r
91\r
92!endif\r
93################################################################################\r
94#\r
95# Following are lists of FD Region layout which correspond to the locations of different\r
96# images within the flash device.\r
97#\r
98# Regions must be defined in ascending order and may not overlap.\r
99#\r
100# A Layout Region start with a eight digit hex offset (leading "0x" required) followed by\r
101# the pipe "|" character, followed by the size of the region, also in hex with the leading\r
102# "0x" characters. Like:\r
103# Offset|Size\r
104# PcdOffsetCName|PcdSizeCName\r
105# RegionType <FV, DATA, or FILE>\r
106# Fv Size can be adjusted; FVMAIN_COMPACT can be reduced to 0x120000, and FV_RECOVERY can be enlarged to 0x80000\r
107#\r
108################################################################################\r
109 #\r
110 # CPU Microcodes\r
111 #\r
112\r
113$(FLASH_REGION_VLVMICROCODE_OFFSET)|$(FLASH_REGION_VLVMICROCODE_SIZE)\r
114gPlatformModuleTokenSpaceGuid.PcdFlashMicroCodeAddress|gPlatformModuleTokenSpaceGuid.PcdFlashMicroCodeSize\r
115FV = MICROCODE_FV\r
116$(FLASH_REGION_VPD_OFFSET)|$(FLASH_REGION_VPD_SIZE)\r
117gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize\r
118#NV_VARIABLE_STORE\r
119DATA = {\r
120 ## This is the EFI_FIRMWARE_VOLUME_HEADER\r
121 # ZeroVector []\r
122 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r
123 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r
124 # FileSystemGuid: gEfiSystemNvDataFvGuid =\r
125 # { 0xFFF12B8D, 0x7696, 0x4C8B, { 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50 }}\r
126 0x8D, 0x2B, 0xF1, 0xFF, 0x96, 0x76, 0x8B, 0x4C,\r
127 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50,\r
128 # FvLength: 0x80000\r
129 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00,\r
130 #Signature "_FVH" #Attributes\r
131 0x5f, 0x46, 0x56, 0x48, 0xff, 0xfe, 0x04, 0x00,\r
132 #HeaderLength #CheckSum #ExtHeaderOffset #Reserved #Revision\r
133 0x48, 0x00, 0x2A, 0x09, 0x00, 0x00, 0x00, 0x02,\r
134 #Blockmap[0]: 7 Blocks * 0x10000 Bytes / Block\r
135 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00,\r
136 #Blockmap[1]: End\r
137 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r
138 ## This is the VARIABLE_STORE_HEADER\r
139!if $(SECURE_BOOT_ENABLE) == TRUE\r
140 #Signature: gEfiAuthenticatedVariableGuid =\r
141 # { 0xaaf32c78, 0x947b, 0x439a, { 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92 }}\r
142 0x78, 0x2c, 0xf3, 0xaa, 0x7b, 0x94, 0x9a, 0x43,\r
143 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92,\r
144!else\r
145 #Signature: gEfiVariableGuid =\r
146 # { 0xddcf3616, 0x3275, 0x4164, { 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d }}\r
147 0x16, 0x36, 0xcf, 0xdd, 0x75, 0x32, 0x64, 0x41,\r
148 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d,\r
149!endif\r
150 #Size: 0x3E000 (gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize) - 0x48 (size of EFI_FIRMWARE_VOLUME_HEADER) = 0x03DFB8\r
151 # This can speed up the Variable Dispatch a bit.\r
152 0xB8, 0xDF, 0x03, 0x00,\r
153 #FORMATTED: 0x5A #HEALTHY: 0xFE #Reserved: UINT16 #Reserved1: UINT32\r
154 0x5A, 0xFE, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00\r
155}\r
156\r
157\r
158$(FLASH_REGION_NVSTORAGE_SUBREGION_NV_FTW_WORKING_OFFSET)|$(FLASH_REGION_NVSTORAGE_SUBREGION_NV_FTW_WORKING_SIZE)\r
159gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize\r
160#NV_FTW_WORKING\r
161DATA = {\r
162 # EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER->Signature = gEdkiiWorkingBlockSignatureGuid =\r
163 # { 0x9e58292b, 0x7c68, 0x497d, { 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95 }}\r
164 0x2B, 0x29, 0x58, 0x9E, 0x68, 0x7C, 0x7D, 0x49,\r
165 0xA0, 0xCE, 0x65, 0x0, 0xFD, 0x9F, 0x1B, 0x95,\r
166\r
167 # Crc:UINT32 #WorkingBlockValid:1, WorkingBlockInvalid:1, Reserved\r
168 0xE2, 0x33, 0xF2, 0x3, 0xFE, 0xFF, 0xFF, 0xFF,\r
169 # WriteQueueSize: UINT64 #Size: 0x2000 - 0x20 (FTW_WORKING_HEADER) = 0x1FE0\r
170 0xE0, 0x1F, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00\r
171}\r
172\r
173$(FLASH_REGION_NVSTORAGE_SUBREGION_NV_FTW_SPARE_OFFSET)|$(FLASH_REGION_NVSTORAGE_SUBREGION_NV_FTW_SPARE_SIZE)\r
174gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize\r
175\r
176!if $(MINNOW2_FSP_BUILD) == TRUE\r
177\r
178 $(FLASH_REGION_FSPBIN_OFFSET)|$(FLASH_REGION_FSPBIN_SIZE)\r
179 gFspWrapperTokenSpaceGuid.PcdFlashFvFspBase|gFspWrapperTokenSpaceGuid.PcdFlashFvFspSize\r
46002a4a 180 FILE = Vlv2SocBinPkg/FspBinary/FvFsp.bin\r
5e752084 181\r
182\r
183 $(FLASH_REGION_AZALIABIN_OFFSET)|$(FLASH_REGION_AZALIABIN_SIZE)\r
184 FILE = Vlv2TbltDevicePkg/FspAzaliaConfigData/AzaliaConfig.bin\r
185\r
186!endif\r
187\r
188 #\r
189 # Main Block\r
190 #\r
191$(FLASH_REGION_FVMAIN_OFFSET)|$(FLASH_REGION_FVMAIN_SIZE)\r
192gPlatformModuleTokenSpaceGuid.PcdFlashFvMainBase|gPlatformModuleTokenSpaceGuid.PcdFlashFvMainSize\r
193FV = FVMAIN_COMPACT\r
194\r
195 #\r
196 # FV Recovery#2\r
197 #\r
198$(FLASH_REGION_FV_RECOVERY2_OFFSET)|$(FLASH_REGION_FV_RECOVERY2_SIZE)\r
199gPlatformModuleTokenSpaceGuid.PcdFlashFvRecovery2Base|gPlatformModuleTokenSpaceGuid.PcdFlashFvRecovery2Size\r
200FV = FVRECOVERY2\r
201\r
202 #\r
203 # FV Recovery\r
204 #\r
205$(FLASH_REGION_FV_RECOVERY_OFFSET)|$(FLASH_REGION_FV_RECOVERY_SIZE)\r
206gPlatformModuleTokenSpaceGuid.PcdFlashFvRecoveryBase|gPlatformModuleTokenSpaceGuid.PcdFlashFvRecoverySize\r
207FV = FVRECOVERY\r
208\r
209################################################################################\r
210#\r
211# FV Section\r
212#\r
213# [FV] section is used to define what components or modules are placed within a flash\r
214# device file. This section also defines order the components and modules are positioned\r
215# within the image. The [FV] section consists of define statements, set statements and\r
216# module statements.\r
217#\r
218################################################################################\r
219[FV.MICROCODE_FV]\r
220BlockSize = $(FLASH_BLOCK_SIZE)\r
221FvAlignment = 16\r
222ERASE_POLARITY = 1\r
223MEMORY_MAPPED = TRUE\r
224STICKY_WRITE = TRUE\r
225LOCK_CAP = TRUE\r
226LOCK_STATUS = FALSE\r
227WRITE_DISABLED_CAP = TRUE\r
228WRITE_ENABLED_CAP = TRUE\r
229WRITE_STATUS = TRUE\r
230WRITE_LOCK_CAP = TRUE\r
231WRITE_LOCK_STATUS = TRUE\r
232READ_DISABLED_CAP = TRUE\r
233READ_ENABLED_CAP = TRUE\r
234READ_STATUS = TRUE\r
235READ_LOCK_CAP = TRUE\r
236READ_LOCK_STATUS = TRUE\r
237\r
238FILE RAW = 197DB236-F856-4924-90F8-CDF12FB875F3 {\r
1aa9314e 239 $(OUTPUT_DIRECTORY)/$(TARGET)_$(TOOL_CHAIN_TAG)/$(DXE_ARCHITECTURE)/MicrocodeUpdates.bin\r
5e752084 240}\r
241\r
c5a59080
JY
242!if $(RECOVERY_ENABLE)\r
243[FV.FVRECOVERY_COMPONENTS]\r
244FvAlignment = 16 #FV alignment and FV attributes setting.\r
245ERASE_POLARITY = 1\r
246MEMORY_MAPPED = TRUE\r
247STICKY_WRITE = TRUE\r
248LOCK_CAP = TRUE\r
249LOCK_STATUS = TRUE\r
250WRITE_DISABLED_CAP = TRUE\r
251WRITE_ENABLED_CAP = TRUE\r
252WRITE_STATUS = TRUE\r
253WRITE_LOCK_CAP = TRUE\r
254WRITE_LOCK_STATUS = TRUE\r
255READ_DISABLED_CAP = TRUE\r
256READ_ENABLED_CAP = TRUE\r
257READ_STATUS = TRUE\r
258READ_LOCK_CAP = TRUE\r
259READ_LOCK_STATUS = TRUE\r
260\r
261INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/PchUsb.inf\r
262INF MdeModulePkg/Bus/Pci/EhciPei/EhciPei.inf\r
263INF MdeModulePkg/Bus/Usb/UsbBusPei/UsbBusPei.inf\r
264INF MdeModulePkg/Bus/Usb/UsbBotPei/UsbBotPei.inf\r
265INF FatPkg/FatPei/FatPei.inf\r
266INF MdeModulePkg/Universal/Disk/CdExpressPei/CdExpressPei.inf\r
267INF SignedCapsulePkg/Universal/RecoveryModuleLoadPei/RecoveryModuleLoadPei.inf\r
268!endif\r
269\r
5e752084 270################################################################################\r
271#\r
272# FV Section\r
273#\r
274# [FV] section is used to define what components or modules are placed within a flash\r
275# device file. This section also defines order the components and modules are positioned\r
276# within the image. The [FV] section consists of define statements, set statements and\r
277# module statements.\r
278#\r
279################################################################################\r
280[FV.FVRECOVERY2]\r
281BlockSize = $(FLASH_BLOCK_SIZE)\r
282FvAlignment = 16 #FV alignment and FV attributes setting.\r
283ERASE_POLARITY = 1\r
284MEMORY_MAPPED = TRUE\r
285STICKY_WRITE = TRUE\r
286LOCK_CAP = TRUE\r
287LOCK_STATUS = TRUE\r
288WRITE_DISABLED_CAP = TRUE\r
289WRITE_ENABLED_CAP = TRUE\r
290WRITE_STATUS = TRUE\r
291WRITE_LOCK_CAP = TRUE\r
292WRITE_LOCK_STATUS = TRUE\r
293READ_DISABLED_CAP = TRUE\r
294READ_ENABLED_CAP = TRUE\r
295READ_STATUS = TRUE\r
296READ_LOCK_CAP = TRUE\r
297READ_LOCK_STATUS = TRUE\r
298FvNameGuid = B73FE497-B92E-416e-8326-45AD0D270092\r
299\r
300\r
301\r
302INF $(PLATFORM_PACKAGE)/PlatformInitPei/PlatformInitPei.inf\r
303\r
304!if $(MINNOW2_FSP_BUILD) == FALSE\r
305INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/PchSmbusArpDisabled.inf\r
306INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/VlvInitPeim.inf\r
307INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/PchInitPeim.inf\r
308INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/PchSpiPeim.inf\r
309INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/PeiSmmAccess.inf\r
310INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/PeiSmmControl.inf\r
311INF UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume2Pei.inf\r
312INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/MpS3.inf\r
5e752084 313!endif\r
314\r
98a88a76 315# INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/PiSmmCommunicationPei.inf\r
5e752084 316!if $(TPM_ENABLED) == TRUE\r
2e886a2e 317INF SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf\r
5e752084 318INF SecurityPkg/Tcg/TcgPei/TcgPei.inf\r
319INF SecurityPkg/Tcg/PhysicalPresencePei/PhysicalPresencePei.inf\r
320!endif\r
321!if $(FTPM_ENABLE) == TRUE\r
2e886a2e 322INF SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf #use PCD config\r
5e752084 323!endif\r
324INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf\r
325\r
326!if $(ACPI50_ENABLE) == TRUE\r
327 INF MdeModulePkg/Universal/Acpi/FirmwarePerformanceDataTablePei/FirmwarePerformancePei.inf\r
328!endif\r
329!if $(PERFORMANCE_ENABLE) == TRUE\r
330INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf\r
331!endif\r
332\r
c5a59080
JY
333!if $(RECOVERY_ENABLE)\r
334FILE FV_IMAGE = 1E9D7604-EF45-46a0-BD8A-71AC78C17AC1 {\r
335 SECTION PEI_DEPEX_EXP = {gEfiPeiMemoryDiscoveredPpiGuid AND gEfiPeiBootInRecoveryModePpiGuid}\r
336 SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF { # LZMA COMPRESS GUID\r
337 SECTION FV_IMAGE = FVRECOVERY_COMPONENTS\r
338 }\r
339}\r
340!endif\r
341\r
5e752084 342[FV.FVRECOVERY]\r
343BlockSize = $(FLASH_BLOCK_SIZE)\r
344FvAlignment = 16 #FV alignment and FV attributes setting.\r
345ERASE_POLARITY = 1\r
346MEMORY_MAPPED = TRUE\r
347STICKY_WRITE = TRUE\r
348LOCK_CAP = TRUE\r
349LOCK_STATUS = TRUE\r
350WRITE_DISABLED_CAP = TRUE\r
351WRITE_ENABLED_CAP = TRUE\r
352WRITE_STATUS = TRUE\r
353WRITE_LOCK_CAP = TRUE\r
354WRITE_LOCK_STATUS = TRUE\r
355READ_DISABLED_CAP = TRUE\r
356READ_ENABLED_CAP = TRUE\r
357READ_STATUS = TRUE\r
358READ_LOCK_CAP = TRUE\r
359READ_LOCK_STATUS = TRUE\r
360FvNameGuid = B73FE497-B92E-416e-8326-45AD0D270091\r
361\r
362\r
363!if $(MINNOW2_FSP_BUILD) == TRUE\r
364INF IntelFspWrapperPkg/FspWrapperSecCore/FspWrapperSecCore.inf\r
365!else\r
366INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/SecCore.inf\r
367!endif\r
368\r
369INF MdeModulePkg/Core/Pei/PeiMain.inf\r
370!if $(MINNOW2_FSP_BUILD) == TRUE\r
371INF Vlv2TbltDevicePkg/FspSupport/BootModePei/BootModePei.inf\r
372INF IntelFspWrapperPkg/FspInitPei/FspInitPei.inf\r
373!endif\r
374INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/CpuPeim.inf\r
375INF MdeModulePkg/Universal/FaultTolerantWritePei/FaultTolerantWritePei.inf\r
376INF MdeModulePkg/Universal/Variable/Pei/VariablePei.inf\r
377\r
378INF $(PLATFORM_PACKAGE)/PlatformPei/PlatformPei.inf\r
379\r
380!if $(MINNOW2_FSP_BUILD) == FALSE\r
381INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/SeCUma.inf\r
382!endif\r
383\r
384!if $(FTPM_ENABLE) == TRUE\r
385INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/fTPMInitPeim.inf\r
386!endif\r
387\r
388!if $(SOURCE_DEBUG_ENABLE) == TRUE\r
389 INF SourceLevelDebugPkg/DebugAgentPei/DebugAgentPei.inf\r
390!endif\r
391\r
392\r
393!if $(CAPSULE_ENABLE) == TRUE\r
394INF MdeModulePkg/Universal/CapsulePei/CapsulePei.inf\r
395!if $(DXE_ARCHITECTURE) == "X64"\r
396INF MdeModulePkg/Universal/CapsulePei/CapsuleX64.inf\r
397!endif\r
398!endif\r
399\r
400!if $(MINNOW2_FSP_BUILD) == FALSE\r
401!if $(PCIESC_ENABLE) == TRUE\r
402INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/PchEarlyInitPeim.inf\r
403!endif\r
404INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/MemoryInit.inf\r
405!endif\r
406\r
407INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r
408\r
409[FV.FVMAIN]\r
410BlockSize = $(FLASH_BLOCK_SIZE)\r
411FvAlignment = 16\r
412ERASE_POLARITY = 1\r
413MEMORY_MAPPED = TRUE\r
414STICKY_WRITE = TRUE\r
415LOCK_CAP = TRUE\r
416LOCK_STATUS = TRUE\r
417WRITE_DISABLED_CAP = TRUE\r
418WRITE_ENABLED_CAP = TRUE\r
419WRITE_STATUS = TRUE\r
420WRITE_LOCK_CAP = TRUE\r
421WRITE_LOCK_STATUS = TRUE\r
422READ_DISABLED_CAP = TRUE\r
423READ_ENABLED_CAP = TRUE\r
424READ_STATUS = TRUE\r
425READ_LOCK_CAP = TRUE\r
426READ_LOCK_STATUS = TRUE\r
427FvNameGuid = A881D567-6CB0-4eee-8435-2E72D33E45B5\r
428\r
429APRIORI DXE {\r
430 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
431 INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf\r
432 INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf\r
433 }\r
434\r
435FILE FREEFORM = C3E36D09-8294-4b97-A857-D5288FE33E28 {\r
436 SECTION RAW = $(OUTPUT_DIRECTORY)/$(TARGET)_$(TOOL_CHAIN_TAG)/$(DXE_ARCHITECTURE)/BiosId.bin\r
437 }\r
438\r
439 #\r
440 # EDK II Related Platform codes\r
441 #\r
442\r
443 !if $(MINNOW2_FSP_BUILD) == TRUE\r
444 INF IntelFspWrapperPkg/FspNotifyDxe/FspNotifyDxe.inf\r
445 !endif\r
446\r
447INF MdeModulePkg/Core/Dxe/DxeMain.inf\r
448INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
449!if $(ACPI50_ENABLE) == TRUE\r
450INF MdeModulePkg/Universal/Acpi/FirmwarePerformanceDataTableDxe/FirmwarePerformanceDxe.inf\r
451INF MdeModulePkg/Universal/Acpi/FirmwarePerformanceDataTableSmm/FirmwarePerformanceSmm.inf\r
452!endif\r
453\r
454\r
455INF IntelFrameworkModulePkg/Universal/CpuIoDxe/CpuIoDxe.inf\r
456INF UefiCpuPkg/CpuIo2Dxe/CpuIo2Dxe.inf\r
457INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf\r
458INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf\r
459INF MdeModulePkg/Universal/ReportStatusCodeRouter/Smm/ReportStatusCodeRouterSmm.inf\r
460INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf\r
86be1a2e 461INF UefiCpuPkg/CpuDxe/CpuDxe.inf\r
5e752084 462INF $(PLATFORM_PACKAGE)/Metronome/Metronome.inf\r
463INF IntelFrameworkModulePkg/Universal/BdsDxe/BdsDxe.inf\r
2cb2b6d6
ZS
464!if $(ARCH) == IA32\r
465INF USE=IA32 MdeModulePkg/Logo/Logo.inf\r
466!else\r
98a88a76 467INF USE=X64 MdeModulePkg/Logo/Logo.inf\r
2cb2b6d6 468!endif\r
5e752084 469INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf\r
470INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf\r
471INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf\r
472INF IntelFrameworkModulePkg/Universal/Acpi/AcpiS3SaveDxe/AcpiS3SaveDxe.inf\r
473\r
474INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableSmmRuntimeDxe.inf\r
475INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableSmm.inf\r
476INF $(PLATFORM_PACKAGE)/FvbRuntimeDxe/FvbSmm.inf\r
477INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteSmm.inf\r
478INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PchSpiSmm.inf\r
479!if $(SECURE_BOOT_ENABLE)\r
480INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf\r
481!endif\r
482\r
483INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf\r
484\r
485INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf\r
486INF PcAtChipsetPkg/PcatRealTimeClockRuntimeDxe/PcatRealTimeClockRuntimeDxe.inf\r
487INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r
488INF $(PLATFORM_PACKAGE)/FvbRuntimeDxe/FvbRuntimeDxe.inf\r
489\r
490\r
491INF $(PLATFORM_PACKAGE)/PlatformSetupDxe/PlatformSetupDxe.inf\r
492\r
493!if $(DATAHUB_ENABLE) == TRUE\r
494INF IntelFrameworkModulePkg/Universal/DataHubDxe/DataHubDxe.inf\r
495!endif\r
496INF IntelFrameworkModulePkg/Universal/StatusCode/DatahubStatusCodeHandlerDxe/DatahubStatusCodeHandlerDxe.inf\r
497INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf\r
498\r
499INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/Dptf.inf\r
500\r
501 #\r
502 # EDK II Related Silicon codes\r
503 #\r
504INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PchS3SupportDxe.inf\r
505\r
506!if $(USE_HPET_TIMER) == TRUE\r
507INF PcAtChipsetPkg/HpetTimerDxe/HpetTimerDxe.inf\r
508!else\r
509INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/SmartTimer.inf\r
510!endif\r
511INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/SmmControl.inf\r
512\r
513INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PchSmbusDxe.inf\r
514\r
515INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/IntelPchLegacyInterrupt.inf\r
516INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PchReset.inf\r
517\r
518!if $(MINNOW2_FSP_BUILD) == FALSE\r
519INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PchInitDxe.inf\r
76386f42 520INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PchInitSmm.inf\r
5e752084 521!endif\r
522INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PchSmiDispatcher.inf\r
523!if $(PCIESC_ENABLE) == TRUE\r
524INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PchPcieSmm.inf\r
525!endif\r
526\r
527INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PchSpiRuntime.inf\r
528INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PchPolicyInitDxe.inf\r
529INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PchBiosWriteProtect.inf\r
530INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/SmmAccess.inf\r
531INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PciHostBridge.inf\r
532!if $(MINNOW2_FSP_BUILD) == FALSE\r
533INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/VlvInitDxe.inf\r
534!else\r
535INF IntelFrameworkModulePkg/Universal/LegacyRegionDxe/LegacyRegionDxe.inf\r
536INF Vlv2TbltDevicePkg/VlvPlatformInitDxe/VlvPlatformInitDxe.inf\r
537!endif\r
538!if $(MINNOW2_FSP_BUILD) == FALSE\r
539 !if $(SEC_ENABLE) == TRUE\r
540 INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/HeciDrv.inf\r
541 INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/SeCPolicyInitDxe.inf\r
542 !endif\r
543!endif\r
544!if $(TPM_ENABLED) == TRUE\r
545INF SecurityPkg/Tcg/TcgConfigDxe/TcgConfigDxe.inf\r
546INF SecurityPkg/Tcg/TcgDxe/TcgDxe.inf\r
547INF RuleOverride = DRIVER_ACPITABLE SecurityPkg/Tcg/TcgSmm/TcgSmm.inf\r
548!endif\r
549!if $(FTPM_ENABLE) == TRUE\r
550INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/Tpm2DeviceSeCPei.inf\r
551INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/Tpm2DeviceSeCDxe.inf\r
552INF SecurityPkg/Tcg/MemoryOverwriteControl/TcgMor.inf\r
2e886a2e 553INF SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf\r
5e752084 554INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/FtpmSmm.inf\r
555!endif\r
556\r
557#\r
558# EDK II Related Platform codes\r
559#\r
560INF $(PLATFORM_PACKAGE)/PlatformSmm/PlatformSmm.inf\r
561INF $(PLATFORM_PACKAGE)/PlatformInfoDxe/PlatformInfoDxe.inf\r
562INF $(PLATFORM_PACKAGE)/PlatformCpuInfoDxe/PlatformCpuInfoDxe.inf\r
563INF $(PLATFORM_PACKAGE)/PlatformDxe/PlatformDxe.inf\r
564INF $(PLATFORM_PACKAGE)/PciPlatform/PciPlatform.inf\r
565INF $(PLATFORM_PACKAGE)/SaveMemoryConfig/SaveMemoryConfig.inf\r
566INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PlatformCpuPolicy.inf\r
567INF $(PLATFORM_PACKAGE)/PpmPolicy/PpmPolicy.inf\r
568INF $(PLATFORM_PACKAGE)/SmramSaveInfoHandlerSmm/SmramSaveInfoHandlerSmm.inf\r
569!if $(GOP_DRIVER_ENABLE) == TRUE\r
570 INF $(PLATFORM_PACKAGE)/PlatformGopPolicy/PlatformGopPolicy.inf\r
571 FILE DRIVER = FF0C8745-3270-4439-B74F-3E45F8C77064 {\r
572 SECTION DXE_DEPEX_EXP = {gPlatformGOPPolicyGuid}\r
46002a4a 573 SECTION PE32 = Vlv2SocBinPkg/GOP/7.2.1011/RELEASE_VS2008x86/$(DXE_ARCHITECTURE)/IntelGopDriver.efi\r
5e752084 574 SECTION UI = "IntelGopDriver"\r
575}\r
576!endif\r
577\r
578INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PnpDxe.inf\r
579 #\r
580 # SMM\r
581 #\r
582INF MdeModulePkg/Core/PiSmmCore/PiSmmIpl.inf\r
583INF MdeModulePkg/Core/PiSmmCore/PiSmmCore.inf\r
f2ae1ef7 584INF UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.inf\r
5e752084 585\r
586INF UefiCpuPkg/CpuIo2Smm/CpuIo2Smm.inf\r
587INF MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBox.inf\r
f2ae1ef7 588INF UefiCpuPkg/PiSmmCommunication/PiSmmCommunicationSmm.inf\r
5e752084 589INF $(PLATFORM_PACKAGE)/SmmSwDispatch2OnSmmSwDispatchThunk/SmmSwDispatch2OnSmmSwDispatchThunk.inf\r
97e862bb
MK
590\r
591#\r
592# Remove the following two SMM binary modules that prevent platform from booting to UEFI Shell\r
593#\r
594#INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PowerManagement2.inf\r
595#INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/DigitalThermalSensor.inf\r
596\r
5e752084 597 #\r
598 # ACPI\r
599 #\r
600INF MdeModulePkg/Universal/Acpi/BootScriptExecutorDxe/BootScriptExecutorDxe.inf\r
601INF $(PLATFORM_PACKAGE)/BootScriptSaveDxe/BootScriptSaveDxe.inf\r
602INF IntelFrameworkModulePkg/Universal/Acpi/AcpiSupportDxe/AcpiSupportDxe.inf\r
603INF RuleOverride = ACPITABLE2 Vlv2DeviceRefCodePkg/ValleyView2Soc/CPU/PowerManagement/AcpiTables/PowerManagementAcpiTables.inf\r
604\r
605INF RuleOverride = ACPITABLE $(PLATFORM_RC_PACKAGE)/AcpiTablesPCAT/AcpiTables.inf\r
606\r
607INF $(PLATFORM_PACKAGE)/AcpiPlatform/AcpiPlatform.inf\r
608\r
98a88a76
KM
609INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResourceTableDxe.inf\r
610\r
5e752084 611 #\r
612 # PCI\r
613 #\r
614INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf\r
615\r
616INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/ISPDxe.inf\r
617\r
618\r
619#\r
620# ISA\r
621#\r
622INF $(PLATFORM_PACKAGE)/Wpce791/Wpce791.inf\r
623INF IntelFrameworkModulePkg/Bus/Isa/IsaBusDxe/IsaBusDxe.inf\r
624INF IntelFrameworkModulePkg/Bus/Isa/IsaIoDxe/IsaIoDxe.inf\r
625!if $(SOURCE_DEBUG_ENABLE) != TRUE\r
626INF IntelFrameworkModulePkg/Bus/Isa/IsaSerialDxe/IsaSerialDxe.inf\r
627!endif\r
628#INF IntelFrameworkModulePkg/Bus/Isa/Ps2MouseDxe/Ps2MouseDxe.inf\r
629#INF IntelFrameworkModulePkg/Bus/Isa/Ps2KeyboardDxe/Ps2keyboardDxe.inf\r
630\r
631#\r
632# SDIO\r
633#\r
98a88a76
KM
634#INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/MmcHost.inf\r
635#INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/MmcMediaDevice.inf\r
5e752084 636#\r
637# IDE/SCSI/AHCI\r
638#\r
639INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf\r
640\r
641INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf\r
642\r
643INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf\r
644!if $(SATA_ENABLE) == TRUE\r
645INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/SataController.inf\r
646#\r
647\r
648#\r
649INF MdeModulePkg/Bus/Ata/AtaBusDxe/AtaBusDxe.inf\r
650INF MdeModulePkg/Bus/Ata/AtaAtapiPassThru/AtaAtapiPassThru.inf\r
651!if $(SCSI_ENABLE) == TRUE\r
652INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf\r
653INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf\r
654!endif\r
655#\r
656!endif\r
657# Console\r
658#\r
659INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf\r
660INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf\r
661INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf\r
662INF IntelFrameworkModulePkg/Universal/Console/VgaClassDxe/VgaClassDxe.inf\r
663INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf\r
664INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf\r
665INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf\r
666INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf\r
667 #\r
668 # USB\r
669 #\r
670!if $(USB_ENABLE) == TRUE\r
671INF MdeModulePkg/Bus/Pci/EhciDxe/EhciDxe.inf\r
672INF MdeModulePkg/Bus/Pci/UhciDxe/UhciDxe.inf\r
673INF MdeModulePkg/Bus/Usb/UsbMassStorageDxe/UsbMassStorageDxe.inf\r
674INF MdeModulePkg/Bus/Usb/UsbKbDxe/UsbKbDxe.inf\r
675INF MdeModulePkg/Bus/Usb/UsbMouseDxe/UsbMouseDxe.inf\r
676INF MdeModulePkg/Bus/Usb/UsbBusDxe/UsbBusDxe.inf\r
677INF MdeModulePkg/Bus/Pci/XhciDxe/XhciDxe.inf\r
678!endif\r
679\r
a4712bea 680\r
5e752084 681 #\r
682 # SMBIOS\r
683 #\r
684INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf\r
685INF $(PLATFORM_PACKAGE)/SmBiosMiscDxe/SmBiosMiscDxe.inf\r
686\r
687INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/SmbiosMemory.inf\r
688\r
5e752084 689\r
690#\r
691# FAT file system\r
692#\r
693INF FatPkg/EnhancedFatDxe/Fat.inf\r
694\r
695#\r
696# UEFI Shell\r
697#\r
2840bb51 698INF ShellPkg/Application/Shell/Shell.inf\r
5e752084 699\r
7a0e4f8e
RN
700#\r
701# dp command\r
702#\r
703!if $(PERFORMANCE_ENABLE) == TRUE\r
704INF ShellPkg/DynamicCommand/DpDynamicCommand/DpDynamicCommand.inf\r
705!endif\r
5e752084 706\r
707!if $(GOP_DRIVER_ENABLE) == TRUE\r
708FILE FREEFORM = 878AC2CC-5343-46F2-B563-51F89DAF56BA {\r
46002a4a 709 SECTION RAW = Vlv2SocBinPkg/GOP/7.2.1011/VBT/MNW2/Vbt.bin\r
5e752084 710 SECTION UI = "IntelGopVbt"\r
711}\r
712!endif\r
713\r
714#\r
715# Network Modules\r
716#\r
717!if $(NETWORK_ENABLE) == TRUE\r
718 FILE DRIVER = 22DE1691-D65D-456a-993E-A253DD1F308C {\r
46002a4a 719 SECTION PE32 = Vlv2SocBinPkg/UNDI/RtkUndiDxe/$(DXE_ARCHITECTURE)/RtkUndiDxe.efi\r
5e752084 720 SECTION UI = "UNDI"\r
721 }\r
722 INF MdeModulePkg/Universal/Network/SnpDxe/SnpDxe.inf\r
723 INF MdeModulePkg/Universal/Network/DpcDxe/DpcDxe.inf\r
724 INF MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf\r
725 INF MdeModulePkg/Universal/Network/ArpDxe/ArpDxe.inf\r
726 INF MdeModulePkg/Universal/Network/Ip4Dxe/Ip4Dxe.inf\r
727 INF MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf\r
728 INF MdeModulePkg/Universal/Network/Dhcp4Dxe/Dhcp4Dxe.inf\r
729 INF MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf\r
5f137127
FS
730 INF NetworkPkg/UefiPxeBcDxe/UefiPxeBcDxe.inf\r
731 INF NetworkPkg/TcpDxe/TcpDxe.inf\r
5e752084 732 !if $(NETWORK_IP6_ENABLE) == TRUE\r
733 INF NetworkPkg/Ip6Dxe/Ip6Dxe.inf\r
734 INF NetworkPkg/Dhcp6Dxe/Dhcp6Dxe.inf\r
5e752084 735 INF NetworkPkg/Udp6Dxe/Udp6Dxe.inf\r
736 INF NetworkPkg/Mtftp6Dxe/Mtftp6Dxe.inf\r
737 !endif\r
5e752084 738 !if $(NETWORK_VLAN_ENABLE) == TRUE\r
739 INF MdeModulePkg/Universal/Network/VlanConfigDxe/VlanConfigDxe.inf\r
740 !endif\r
741 !if $(NETWORK_ISCSI_ENABLE) == TRUE\r
5e752084 742 INF NetworkPkg/IScsiDxe/IScsiDxe.inf\r
5e752084 743 !endif\r
744!endif\r
745\r
c5a59080 746!if $(CAPSULE_ENABLE)\r
1aa9314e
MK
747INF MdeModulePkg/Universal/EsrtFmpDxe/EsrtFmpDxe.inf\r
748\r
749#\r
750# Minnow Max System Firmware FMP\r
751#\r
752INF FILE_GUID = $(FMP_MINNOW_MAX_SYSTEM) FmpDevicePkg/FmpDxe/FmpDxe.inf\r
753\r
754#\r
755# Sample Device FMP\r
756#\r
757INF FILE_GUID = $(FMP_GREEN_SAMPLE_DEVICE) FmpDevicePkg/FmpDxe/FmpDxe.inf\r
758INF FILE_GUID = $(FMP_BLUE_SAMPLE_DEVICE) FmpDevicePkg/FmpDxe/FmpDxe.inf\r
759INF FILE_GUID = $(FMP_RED_SAMPLE_DEVICE) FmpDevicePkg/FmpDxe/FmpDxe.inf\r
760\r
c5a59080 761!endif\r
1aa9314e 762\r
c5a59080 763!if $(MICOCODE_CAPSULE_ENABLE)\r
1aa9314e 764INF IntelSiliconPkg/Feature/Capsule/MicrocodeUpdateDxe/MicrocodeUpdateDxe.inf\r
c5a59080
JY
765!endif\r
766\r
767!if $(RECOVERY_ENABLE)\r
768FILE FREEFORM = PCD(gEfiSignedCapsulePkgTokenSpaceGuid.PcdEdkiiRsa2048Sha256TestPublicKeyFileGuid) {\r
769 SECTION RAW = BaseTools/Source/Python/Rsa2048Sha256Sign/TestSigningPublicKey.bin\r
770 SECTION UI = "Rsa2048Sha256TestSigningPublicKey"\r
771 }\r
772!endif\r
773\r
5e752084 774[FV.FVMAIN_COMPACT]\r
775BlockSize = $(FLASH_BLOCK_SIZE)\r
776FvAlignment = 16\r
777ERASE_POLARITY = 1\r
778MEMORY_MAPPED = TRUE\r
779STICKY_WRITE = TRUE\r
780LOCK_CAP = TRUE\r
781LOCK_STATUS = TRUE\r
782WRITE_DISABLED_CAP = TRUE\r
783WRITE_ENABLED_CAP = TRUE\r
784WRITE_STATUS = TRUE\r
785WRITE_LOCK_CAP = TRUE\r
786WRITE_LOCK_STATUS = TRUE\r
787READ_DISABLED_CAP = TRUE\r
788READ_ENABLED_CAP = TRUE\r
789READ_STATUS = TRUE\r
790READ_LOCK_CAP = TRUE\r
791READ_LOCK_STATUS = TRUE\r
792\r
793\r
794\r
795FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {\r
796!if $(LZMA_ENABLE) == TRUE\r
797# LZMA Compress\r
798 SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {\r
799 SECTION FV_IMAGE = FVMAIN\r
800 }\r
801!else\r
802!if $(DXE_COMPRESS_ENABLE) == TRUE\r
803# Tiano Compress\r
804 SECTION GUIDED A31280AD-481E-41B6-95E8-127F4C984779 PROCESSING_REQUIRED = TRUE {\r
805 SECTION FV_IMAGE = FVMAIN\r
806 }\r
807!else\r
808# No Compress\r
809 SECTION COMPRESS PI_NONE {\r
810 SECTION FV_IMAGE = FVMAIN\r
811 }\r
812!endif\r
813!endif\r
814 }\r
815\r
816[FV.SETUP_DATA]\r
817BlockSize = $(FLASH_BLOCK_SIZE)\r
818#NumBlocks = 0x10\r
819FvAlignment = 16\r
820ERASE_POLARITY = 1\r
821MEMORY_MAPPED = TRUE\r
822STICKY_WRITE = TRUE\r
823LOCK_CAP = TRUE\r
824LOCK_STATUS = TRUE\r
825WRITE_DISABLED_CAP = TRUE\r
826WRITE_ENABLED_CAP = TRUE\r
827WRITE_STATUS = TRUE\r
828WRITE_LOCK_CAP = TRUE\r
829WRITE_LOCK_STATUS = TRUE\r
830READ_DISABLED_CAP = TRUE\r
831READ_ENABLED_CAP = TRUE\r
832READ_STATUS = TRUE\r
833READ_LOCK_CAP = TRUE\r
834READ_LOCK_STATUS = TRUE\r
835\r
5e752084 836################################################################################\r
837#\r
838# Rules are use with the [FV] section's module INF type to define\r
839# how an FFS file is created for a given INF file. The following Rule are the default\r
840# rules for the different module type. User can add the customized rules to define the\r
841# content of the FFS file.\r
842#\r
843################################################################################\r
844[Rule.Common.SEC]\r
845 FILE SEC = $(NAMED_GUID) RELOCS_STRIPPED {\r
846 PE32 PE32 Align = 8 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
847 RAW BIN Align = 16 |.com\r
848 }\r
849\r
850[Rule.Common.SEC.BINARY]\r
851 FILE SEC = $(NAMED_GUID) RELOCS_STRIPPED {\r
852 PE32 PE32 Align = 8 |.efi\r
853 RAW BIN Align = 16 |.com\r
854 }\r
855\r
856[Rule.Common.PEI_CORE]\r
857 FILE PEI_CORE = $(NAMED_GUID) {\r
858 PE32 PE32 Align = Auto $(INF_OUTPUT)/$(MODULE_NAME).efi\r
859 UI STRING="$(MODULE_NAME)" Optional\r
860 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
861 }\r
862\r
863[Rule.Common.PEIM]\r
864 FILE PEIM = $(NAMED_GUID) {\r
865 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
866 PE32 PE32 Align = Auto $(INF_OUTPUT)/$(MODULE_NAME).efi\r
867 UI STRING="$(MODULE_NAME)" Optional\r
868 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
869 }\r
870\r
871[Rule.Common.PEIM.BINARY]\r
872 FILE PEIM = $(NAMED_GUID) {\r
873 PEI_DEPEX PEI_DEPEX Optional |.depex\r
874 PE32 PE32 Align = Auto |.efi\r
875 UI STRING="$(MODULE_NAME)" Optional\r
876 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
877 }\r
878\r
879[Rule.Common.PEIM.BIOSID]\r
880 FILE PEIM = $(NAMED_GUID) {\r
881 RAW BIN BiosId.bin\r
882 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
883 PE32 PE32 Align = Auto $(INF_OUTPUT)/$(MODULE_NAME).efi\r
884 UI STRING="$(MODULE_NAME)" Optional\r
885 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
886 }\r
887\r
888[Rule.Common.USER_DEFINED.APINIT]\r
889 FILE RAW = $(NAMED_GUID) Fixed Align=4K {\r
890 RAW SEC_BIN |.com\r
891 }\r
892#cjia 2011-07-21\r
893[Rule.Common.USER_DEFINED.LEGACY16]\r
894 FILE FREEFORM = $(NAMED_GUID) {\r
895 UI STRING="$(MODULE_NAME)" Optional\r
896 RAW BIN |.bin\r
897 }\r
898#cjia\r
899\r
900[Rule.Common.USER_DEFINED.ASM16]\r
901 FILE FREEFORM = $(NAMED_GUID) {\r
902 UI STRING="$(MODULE_NAME)" Optional\r
903 RAW BIN |.com\r
904 }\r
905\r
906[Rule.Common.DXE_CORE]\r
907 FILE DXE_CORE = $(NAMED_GUID) {\r
908 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
909 UI STRING="$(MODULE_NAME)" Optional\r
910 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
911 }\r
912\r
913[Rule.Common.UEFI_DRIVER]\r
914 FILE DRIVER = $(NAMED_GUID) {\r
915 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
916 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
917 UI STRING="$(MODULE_NAME)" Optional\r
918 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
919 }\r
920\r
921[Rule.Common.UEFI_DRIVER.BINARY]\r
922 FILE DRIVER = $(NAMED_GUID) {\r
923 DXE_DEPEX DXE_DEPEX Optional |.depex\r
924 PE32 PE32 |.efi\r
925 UI STRING="$(MODULE_NAME)" Optional\r
926 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
927 }\r
928\r
929[Rule.Common.UEFI_DRIVER.NATIVE_BINARY]\r
930 FILE DRIVER = $(NAMED_GUID) {\r
931 DXE_DEPEX DXE_DEPEX Optional $(WORKSPACE)/$(PLATFORM_PACKAGE)/IntelGopDepex/IntelGopDriver.depex\r
932 PE32 PE32 |.efi\r
933 UI STRING="$(MODULE_NAME)" Optional\r
934 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
935 }\r
936\r
937[Rule.Common.DXE_DRIVER]\r
938 FILE DRIVER = $(NAMED_GUID) {\r
939 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
940 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
941 UI STRING="$(MODULE_NAME)" Optional\r
942 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
943 }\r
944\r
945[Rule.Common.DXE_DRIVER.BINARY]\r
946 FILE DRIVER = $(NAMED_GUID) {\r
947 DXE_DEPEX DXE_DEPEX Optional |.depex\r
948 PE32 PE32 |.efi\r
949 UI STRING="$(MODULE_NAME)" Optional\r
950 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
951 }\r
952\r
953[Rule.Common.DXE_DRIVER.DRIVER_ACPITABLE]\r
954 FILE DRIVER = $(NAMED_GUID) {\r
955 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
956 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
957 UI STRING="$(MODULE_NAME)" Optional\r
958 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
959 RAW ACPI Optional |.acpi\r
960 RAW ASL Optional |.aml\r
961 }\r
962\r
963[Rule.Common.DXE_RUNTIME_DRIVER]\r
964 FILE DRIVER = $(NAMED_GUID) {\r
965 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
966 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
967 UI STRING="$(MODULE_NAME)" Optional\r
968 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
969 }\r
970\r
971[Rule.Common.DXE_RUNTIME_DRIVER.BINARY]\r
972 FILE DRIVER = $(NAMED_GUID) {\r
973 DXE_DEPEX DXE_DEPEX Optional |.depex\r
974 PE32 PE32 |.efi\r
975 UI STRING="$(MODULE_NAME)" Optional\r
976 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
977 }\r
978\r
979[Rule.Common.DXE_SMM_DRIVER]\r
980 FILE SMM = $(NAMED_GUID) {\r
981 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
982 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
983 UI STRING="$(MODULE_NAME)" Optional\r
984 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
985 }\r
986\r
987[Rule.Common.DXE_SMM_DRIVER.BINARY]\r
988 FILE SMM = $(NAMED_GUID) {\r
989 SMM_DEPEX SMM_DEPEX |.depex\r
990 PE32 PE32 |.efi\r
991 RAW BIN Optional |.aml\r
992 UI STRING="$(MODULE_NAME)" Optional\r
993 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
994 }\r
995\r
996[Rule.Common.DXE_SMM_DRIVER.DRIVER_ACPITABLE]\r
997 FILE SMM = $(NAMED_GUID) {\r
998 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
999 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
1000 UI STRING="$(MODULE_NAME)" Optional\r
1001 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
1002 RAW ACPI Optional |.acpi\r
1003 RAW ASL Optional |.aml\r
1004 }\r
1005\r
1006[Rule.Common.SMM_CORE]\r
1007 FILE SMM_CORE = $(NAMED_GUID) {\r
1008 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
1009 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
1010 UI STRING="$(MODULE_NAME)" Optional\r
1011 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
1012 }\r
1013\r
1014[Rule.Common.SMM_CORE.BINARY]\r
1015 FILE SMM_CORE = $(NAMED_GUID) {\r
1016 DXE_DEPEX DXE_DEPEX Optional |.depex\r
1017 PE32 PE32 |.efi\r
1018 UI STRING="$(MODULE_NAME)" Optional\r
1019 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
1020 }\r
1021\r
1022[Rule.Common.UEFI_APPLICATION]\r
1023 FILE APPLICATION = $(NAMED_GUID) {\r
1024 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
1025 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
1026 UI STRING="$(MODULE_NAME)" Optional\r
1027 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
1028 }\r
1029\r
1030[Rule.Common.UEFI_APPLICATION.UI]\r
1031 FILE APPLICATION = $(NAMED_GUID) {\r
1032 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
1033 UI STRING="Enter Setup"\r
1034 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
1035 }\r
1036\r
1037[Rule.Common.USER_DEFINED]\r
1038 FILE FREEFORM = $(NAMED_GUID) {\r
1039 UI STRING="$(MODULE_NAME)" Optional\r
1040 RAW BIN |.bin\r
1041 }\r
1042\r
98a88a76
KM
1043[Rule.Common.USER_DEFINED.BINARY]\r
1044 FILE FREEFORM = $(NAMED_GUID) {\r
1045 UI STRING="$(MODULE_NAME)" Optional\r
1046 RAW BIN |.bin\r
1047 }\r
1048\r
5e752084 1049[Rule.Common.USER_DEFINED.ACPITABLE]\r
1050 FILE FREEFORM = $(NAMED_GUID) {\r
1051 RAW ACPI Optional |.acpi\r
1052 RAW ASL Optional |.aml\r
1053 }\r
1054\r
1055[Rule.Common.USER_DEFINED.ACPITABLE2]\r
1056 FILE FREEFORM = $(NAMED_GUID) {\r
1057 RAW ASL Optional |.aml\r
1058 }\r
1059\r
1060[Rule.Common.ACPITABLE]\r
1061 FILE FREEFORM = $(NAMED_GUID) {\r
1062 RAW ACPI Optional |.acpi\r
1063 RAW ASL Optional |.aml\r
1064 }\r
1065\r
c5a59080
JY
1066[Rule.Common.PEIM.FMP_IMAGE_DESC]\r
1067 FILE PEIM = $(NAMED_GUID) {\r
1068 RAW BIN |.acpi\r
1069 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
1070 PE32 PE32 Align=4K $(INF_OUTPUT)/$(MODULE_NAME).efi\r
1071 UI STRING="$(MODULE_NAME)" Optional\r
1072 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
1073 }\r